MGMT 341 Final

Ace your homework & exams now with Quizwiz!

Which of the following is the most complete desciption of computer crime? -processing private information from an official computer system. -using a computer to commit an illegal act -unauthorized use of a computer device -stealing computer devices

using a computer to commit an illegal act

Match each part of the URL www.winthrop.edu to the correct term for it. -www -winthrop -edu

-www - host -winthrop - domain -edu - top level domain

Which of the following technologies opens new avenues for copyright violations? -3D printing -IIoT -Big Data -home automation

3D printing

Data mining is most closely associated with ______ CRM. -Analytical -Operational -Collaborative

Analytical

Which is the correct list of the three general ways Informations Systems provide value? -Organizational Learning - Supporting Strategy - Analyzing Competitive Forces -Automating - Organizational Learning - Supporting Strategy -Increasing innovation - Automating - Supporting strategy

Automating - Organizational Learning - Supporting Strategy

A systematic approach by all of an organization to examine, rethink and redesign processes in order to improve performance is called _________________.

Business process management

Systems for providing effective communication (with the customer) from the entire organization are -Analytical CRM -Operational CRM -Collaborative CRM

Collaborative CRM

federal law prohibiting stealing data about national defense, banking data or threatening a US President or other federal administrative members

Computer Fraud and Abuse Act

Which of the following are items of concern in managing an I.S. infrastructure? -Data Center (or data warehouse) -Networking -Employee skill -Software -Hardware

Data Center (or data warehouse); Networking; Employee skill; Software; Hardware

Old system is discontinued and new system is in use immediately. A. Parallel B. Direct C. Phased D. Pilot

Direct

federal law makes it a crime to intercept/record communications services without the knowledge and permission of those being recorded.

Electronic Communications Privacy Act

Which of the following statements is the best example of organizational learning? -Employees of an organization visiting a local high school's career day. -Employees of an organization carefully analyzing inventory reports from the past quarter in preparation of ordering for the upcoming quarter. -A mandatory training session for employees to learn to use a new software application. -A company sponsored seminar for employees to learn about retirement planning.

Employees of an organization carefully analyzing inventory reports from the past quarter in preparation of ordering for the upcoming quarter.

Which of the following are considered the primary threats to IS Security? Select all that apply -Viruses -Employees -Accidents/Natural Disasters -Outside Intruders -Links to Outside Associates -Hackers -Email attachments

Employees; Accidents/Natural Disasters; Links to Outside Associates; Email attachments

focuses on long-term strategic questions, often making decisions that are unstructured

Executive Level

Which of the following terms refers to a private part of the Internet used by an organization to allow access only to those it chooses to grant access to, such as customers, suppliers, etc. ? -Intranet -Extranet -PBX -Internet

Extranet

Choosing and implementing an emerging information system or technology is sufficient to gain and sustain competitive advantage. -True -False

False

Cybersquatting is considered unethical but is not illegal -True -False

False

Operational, managerial, and executive decision making levels are all supported by a single type of information system. -True -False

False

The Systems Development Life Cycle is a series of four phases that must be completed in order, with no back-tracking or iteration of phases. -True -False

False

The World Wide Web is the term used to mean the network of the Internet overall, including the computers, the transmission media and all of the digital information stored or displayed -True -False

False

The term "computer security" refers only to the activities related to protecting computers against criminal activity. -True -False

False

The terms "database" and "database management system" are synonomous. -True -False

False

Transmission of data, voice and video over the same network.

IP Convergence

Select all statements below that are true of IP addresses. -An IP address is made up of letters that spell the name of the company. -IP addresses are made up of numbers. -The domain name translates to an IP address.

IP addresses are made up of numbers.; The domain name translates to an IP address.

a system that uses sensors that emulate or enhance human capabilities

Intelligent system

Which of the following terms refers to a broad range of physical objects connected to the internet that can share data over the internet? -The Web -Global information systems -Information systems -Internet of Things

Internet of Things

Which of the following terms refers to a private network which uses web technology for transmission and is used only by authorized users within an organization, such as employees? -Intranet -Internet -PBX -Extranet

Intranet

Which of the following statements is true about an IP address? -It is written as a number with a period at the end. -None of the available statements is true. -Each number separated by periods can have any number between 0 and 999. -It can be used to navigate to particular Web addresses.

It can be used to navigate to particular Web addresses.

collection of tools to enable generation, storage and management of tacit and explicit assets

Knowledge management system

focuses on monitoring and controlling operations and providing information to higher level personnel

Managerial Level

____________ law stated that computing power (transistors on a chip) would double about every 2 years

Moore's

According to ______, the number of transistors that could be squeezed onto a silicon chip would double about every 18 months to 2 years -laws of physics -Moore's law -cloud computing standards -Megan's law

Moore's law

SFA (sales force automation) is most closely associated with ______ CRM. -Operational -Analytical -Collaborative

Operational

focuses on day-to-day operations, usually making routine, structured decisions

Operational Level

Both old and new system used for some time to verify the new system performs as expected. A. Parallel B. Direct C. Phased D. Pilot

Parallel

allows investigators to intercept communication under certain circumstances

Patriot Act

Analyst gathers information and builds a business case for a new/improved system A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation

Phase 1, Systems Planning/Selection

Collect requirements, model data (determine data that is needed) A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation

Phase 2, Systems Analysis

Processing is designed and the logic is determined. Pseudocode is often used. A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation

Phase 3 Systems Design

Install the system. Testing. Training. A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation

Phase 4 Systems Implementation

Software programming/writing code A. Phase 1, Systems Planning/Selection B. Phase 2, Systems Analysis C. Phase 3 Systems Design D. Phase 4 Systems Implementation

Phase 4 Systems Implementation

Parts , or modules, of a new system are implemented one at a time over time. A. Parallel B. Direct C. Phased D. Pilot

Phased

new system is implemented in one location or department before implementation in all other areas A. Parallel B. Direct C. Phased D. Pilot

Pilot

Which of the following is the best description of a knowledge worker? -Computer programmers. -Professionals who create, modify, and/or synthesize knowledge as a fundamental part of their job. -Professionals who use knowledge in their work every day.

Professionals who create, modify, and/or synthesize knowledge as a fundamental part of their job

Which of the following terms is an approach to systems development that is best used when the endpoint isn't known and involves trial and error until an acceptable solution is found? -AGILE -Prototype -Rapid Application Development (RAD) -SDLC

Prototype

A user of proprietary software has rights to ___ the software. -run -modify -copy -redistribute

Run

the protocol that allows different networks to communicate over the internet

TCP/IP

Core competencies necessary for a career in information systems include which of the following? -Technical competency -Financial accounting competency -Systems competency -Business competency

Technical competency; Systems competency; Business competency

A RFP is often a required step in acquiring a new I.S. through external acquisition A. True B. False

True

As data storage becomes less expensive, the need for storage increases. -True -False

True

CRM is a corporate level strategy to create and maintain lasting relationships with customers.

True

Computer viruses are created intentionally by a hacker and are not caused by incompatibility or conflicts between computer hardware or software. -True -False

True

Enterprise systems that have been customized require thorough testing and possibly further customization with every new version of the system

True

Managerial-level decision making is referred to as semistructured decision making. -True -False

True

RFID is rapidly replacing the use of standard bar codes on most products -True -False

True

Some computer viruses are harmless pranks -True -False

True

To make VMI possible, the manufacturer (or retailer) often allows the supplier to monitor stock levels and ongoing sales data.

True

Which of the following are prohibited by the Computer Ethics Institute's guidelines for responsible computer use? Select all that apply. -Using a computer to harm others -Copying or using software without paying for it -Snooping in other people's files -Using computer resources without authorization

Using a computer to harm others; Copying or using software without paying for it; Snooping in other people's files; Using computer resources without authorization

The _____ version of software includes only the features and modules that a packaged software comes with out of the box.

Vanilla Version

Which of the following statements is from the Target article regarding what they did after consumers became "freaked out" by how much information Target knew about them? -We stopped using the analysis of their purchases to make predictions about their personal life. -We started mixing in all these ads for things we knew pregnant women would never buy, so the baby ads looked random.

We started mixing in all these ads for things we knew pregnant women would never buy, so the baby ads looked random.

A standard developed by the World Wide Web Consortium and used by web designers/programmers to enable the transmission and validation of data between web pages and databases is -HTML -SQL -XML -Java

XML

Which statement(s) below describe a legacy system? Select all that apply. -useful in utilizing and integrating data from many departments and processes. -easy to integrate with other systems. -a stand-alone system that was not designed to support multiple departments. -is fast approaching the end of its useful life span

a stand-alone system that was not designed to support multiple departments; is fast approaching the end of its useful life span

12. The phenomenon of cutting out the middleman in transactions is referred to as a. disintermediation b. e-tailing c. group buying d. showrooming e. net neutrality

a. disintermediation

6. Intranets are most often used by ___________ of an organization a. employees b. customers c. upper level management

a. employees

1. Select the true statement below. a. A file with the extension .csv can be read only by spreadsheets, mathmatical and statistical analysis software applications. b. The file extension .csv stands for Common Standard Values c. In using a .csv file in Excel, saving it as a .csv file again converts all formulas and functions to the displayed values in the saved file

a. A file with the extension .csv can be read only by spreadsheets, mathmatical and statistical analysis software applications.

5. Match a. Crowd sourcing b. collective intelligence c. metadata - the use of the contributions of others as free labor to complete a task. Example: Wikipedia - data about data, which may describe a digital file in terms of when it was created and by whom, etc. - A concept which uses people with a divergent range of skills and expertise to outperform that capabilities of an individual expert. Example might be an online journal about brain surgery.

a. Crowd sourcing - the use of the contributions of others as free labor to complete a task. Example: Wikipedia b. collective intelligence - A concept which uses people with a divergent range of skills and expertise to outperform that capabilities of an individual expert. Example might be an online journal about brain surgery. c. metadata - data about data, which may describe a digital file in terms of when it was created and by whom, etc.

2. Match each of the following terms with the best example. a. Descriptive analytics . b. Predictive Analytics c. Prescriptive analytics - Estimating the expected sales of the coming week based upon last week's sales. - Reviewing reports of restaurant sales from each of night of the prior week - Scheduling the correct number of employees for the coming week based upon last weeks sales reports.

a. Descriptive analytics - Reviewing reports of restaurant sales from each of night of the prior week. b. Predictive Analytics - Estimating the expected sales of the coming week based upon last week's sales. c. Prescriptive analytics - Scheduling the correct number of employees for the coming week based upon last weeks sales reports.

10. A web site that is maintained by the city of Charlotte and allows residents to view the property tax rates is an example of: a. G2C b. C2C c. G2G d. C2B

a. G2C

12. Which of the following are tips for businesses to be prepared in case of a crisis with social media? Select all that apply. a. Identify a crisis team. b. Monitor your social media environment. c. Act fast. d. Before reacting, monitor the situation for a while to see if the problem resolves itself. e. Identify your social media nightmare

a. Identify a crisis team. b. Monitor your social media environment. c. Act fast. e. Identify your social media nightmare

Which of the following statements is true about hard data? a. It includes facts and numbers. b. It involves the use of text mining technologies. c. It includes textual news stories. d. It includes nonanalytical information.

a. It includes facts and numbers.

The most common language used to work with databases and perform queries is called: a. SQL b. XML c. HTML d. TCP/IP

a. SQL

7. Match the following TYPES of reports that are commonly produced from a DBMS with the best description. a. Scheduled b. key-indicator c. drill-down d. ad hoc - give greater detail to help analyze information on a prior report - highlights situations that are out of normal range - produced at predefined intervals or days/times - provide of summary of critical information - unplanned; created to support non-routine decisions

a. Scheduled - produced at predefined intervals or days/times b. key-indicator - provide of summary of critical information c. drill-down - give greater detail to help analyze information on a prior report d. ad hoc - unplanned; created to support non-routine decisions

Which of the following statements concerning the management of master data are true? Select all that apply. a. The information presented by master data is typically shared among units in an organization as "one version of the truth." b. Access to modify or edit master data is to normally allowed to all employees. c. The format and rules of use of master data must be agreed upon by all units in the organization who collect, store or use the data.

a. The information presented by master data is typically shared among units in an organization as "one version of the truth." c. The format and rules of use of master data must be agreed upon by all units in the organization who collect, store or use the data.

. Finding the right technology to manage knowledge assets is often easier than determining what knowledge needs to be captured and who has this knowledge a. True b. False

a. True

3. Data integrity can be protected by human means and by use of technological means a. True b. False

a. True

4. To truncate data means to remove characters from the end of a data element, often to save space. For example, to truncate the word "computer" at 4 characters produces "comp". a. True b. False

a. True

A database is simply a collection of related data organized in a way that makes searches possible. Therefore, a small database could even be stored as an Excel spreadsheet. a. True b. False

a. True

10. Which statements below are benefits of using a CMS? Select all that apply. a. allows collaboration by many users on files. b. allows different users to have differing levels of access. c. Is used only for working with web sites/pages. d. allows users to publish or edit files.

a. allows collaboration by many users on files. b. allows different users to have differing levels of access. d. allows users to publish or edit files.

Methods used to discover previously unknown, or hidden, predictive relationships in data is _____ a. data mining b. clustering c. classification d. data modeling

a. data mining

6. Select the common errors that compromise data integrity. Select all that apply. a. files overwritten b. viruses c. sorting incorrectly d. failure to backup files e. errors in formulas f. truncated data g. power failures

a. files overwritten c. sorting incorrectly e. errors in formulas f. truncated data

5. Technological methods used to protect data integrity and enforce business rules are called: a. integrity contraints b. integrity assurance c. validation d. error messages

a. integrity contraints

7. ______________ is the principle that all traffic on the internet should be treated equally with no interference from the internet service provider or any other 3rd party. a. net neutrality b. m-commerce c. disintermediation d. Internet Tax Freedom Act

a. net neutrality

paying a business to refer customers to another business

affiliate marketing

Securely limiting access to electronic information should include the use of -something you know -something you have -something you are -all other possible answers listed

all other possible answers listed

Which of the following benefits are available with the use of most CRM systems? Select all that apply -allows individualized customer service -enables operation 24 hours a day and 7 days a week -speeds processes -allows timely exchange of data to facilitate improved and timely product development -enables customers to shop online

allows individualized customer service; enables operation 24 hours a day and 7 days a week; speeds processes; allows timely exchange of data to facilitate improved and timely product development

Testing by a software tester that uses sample data and may be done a testing environment is which of the following types? -developmental -alpha -beta

alpha

11. Adding information about the location a file was created is called ________. An example would be adding the longitude and latitude to a photograph. a. tagging b. geotagging c. posting d. labeling

b. geotagging

Which of the following is an example of a utility program? -operating system -a spreadsheet application -a word processor -antivirus program

antivirus program

Which of the following storage methods is used for storing long-term copies of organizational data that typically need to remain unchanged? -operational -archival -translational -backup

archival

2. Which type of e-commerce generates the greatest number of transactions? a. B2B b. B2C c. C2C d. G2C

b. B2C

1. Success using applications in the consumer environment usually indicates the application will be successful in the corporate environment. a. true b. False

b. False

11. SEO is managed well by using appropriate and relevant keywords on your web site. Other concerns such as backlinks are not relevant. a. True b. False

b. False

6. The term "structural firmness" refers to whether a web site is easy to use with menus that are well-designed. a. True b. False

b. False

As explained in the text, in database design redundant data should be avoided for which of the following reasons? Select all that apply. a. redundant data makes it difficult to print the data b. Redundant data wastes file storage space. c. redundant data is not well organized (a change to a phone number could make it necessary to change many instances of that phone number.)

b. Redundant data wastes file storage space. c. redundant data is not well organized (a change to a phone number could make it necessary to change many instances of that phone number.)

13. Which of the following are visual indicators that a web site is being accessed over a secure connection. Select all that apply. a. The web site text states that it is secure. b. The URL begins with "https". c. The web site asks for personal information. d. An image of a locked or green padlock is displayed in the address bar

b. The URL begins with "https". d. An image of a locked or green padlock is displayed in the address bar

In a relational database design, each column is a(n) ______________ a. record b. attribute c. query d. entity

b. attribute

14. The definition of E-Commerce includes internet transactions only. a. true b. false

b. false

2. Changes in technology that enabled dynamic web applications, allowing people to collaborate and share content online is referred to as Web 1.0. a. true b. false

b. false

4. In designing web sites to meet consumers' needs, successful companies will address which of the following sets of characteristics? Select all that apply. a. search engine optimization b. functional convenience c. Structural firmness d. representational delight

b. functional convenience c. Structural firmness d. representational delight

The term which refers to perform a search or retrieval of information from a database is ____________________ a. ad hoc b. query c. normalization d. Lookup

b. query

9. A set of standards for sharing updated web content, such as news, across sites is _____________________ . Access to these updates often requires a user to sign-up or subscribe a. mashup b. real simple syndication c. microblogging d. wikis

b. real simple syndication

3. In order to minimize fraud, EC businesses look for anomolies in which of the following? Select all that apply. a. click fraud b. shipping and billing addresses c. transaction patterns d. e-mail addresses provided

b. shipping and billing addresses c. transaction patterns d. e-mail addresses provided

1. Knowledge management systems often store _______ knowledge assets that reflect processes or procedures that are known, yet difficult to explain to others. a. common b. tacit c. detailed d. explicit

b. tacit

11. Which of the following characteristics are associated with Big Data? Select all that apply. a. verifiability b. volume c. variety d. velocity

b. volume c. variety d. velocity

The transmission capacity of a computer or telecommunications device is -speed -bandwidth -TCP/IP

bandwidth

the transmission capacity of a device or communications channel

bandwidth

Organizations are increasing trying to use ________ , or analyze structured and unstructured data from social media, customer support calls, transactions and other sources. -deep web data -big data -raw data

big data

a commission is paid to the business for aiding in a transaction

brokerage

Large fluctuations in supplies caused by several small fluctuations and the need to create stock "buffers" is the __________________. -supply chain planning -vertical market -product flow -bullwhip effect

bullwhip effect

. In a database storing data about customers, which of the following would be the best choice to be used as a primary key? a. Last name b. Full name c. Customer ID number

c. Customer ID number

4. A ________ is a special purpose information system designed to support organizational decision making. a. Intelligent system b. Transaction processing system c. Decision support system

c. Decision support system

8. A(n) _________________ emulates human capabilities such as reasoning or sensing. a. Decision support system b. database system c. Intelligent agent system d. Transaction processing system.

c. Intelligent agent system

5. Methods for improving a web site's rank in search engine results is a. SEO - search entity operations b. SEO - simple engine optimization c. SEO - search engine optimization d. SEO - search engine operations

c. SEO - search engine optimization

8. The phrase "amateurization of journalism" is often used in reference to which of the following Web 2.0 applications? a. podcasts b. wikis c. blogs d. webcasting

c. blogs

9. Companies following a ________ business strategy choose to operate solely in the traditional physical markets a. brick and click b. click only c. brick and mortar d. none of the above

c. brick and mortar

_______ refers to tools and techniques for analyzing past data a. advanced analytics b. business analytics c. business intelligence

c. business intelligence

2. In data analysis, _____________ is used when records ( or data) are segmented based on grouping known beforehand. a. clustering b. mining c. classification d. drilling down

c. classification

. In a database storing records about employees and the department to which they are assigned, which type of association would be most appropriate? a. many-to-many b. one-to-one c. one-to-many

c. one-to-many

1. According to the laws passed in accordance with the Internet Tax Freedom Act, companies are required to collect sales tax on internet sales a. if they have sales over $100,000 per year. b. if the company was created after 2004. c. only from customers who reside in a state in which the company has a presence. d. according to the laws of the state in which the customer lives

c. only from customers who reside in a state in which the company has a presence.

3. People meeting at the same time, whether in person or virtually is _________ communication. a. asynchronous b. collaborative c. synchronous d. virtual teams

c. synchronous

users pay a fee for using software

licensing

A ______ on a network typically makes requests and receives applications and files from other computers on the network. -client -extranet -peer -intranet -server

client

A short description of _______________ is "network access to a shared pool of computing resources." -cloud computing -IP convergence -utility computing -software as a service

cloud computing

The various services offered online that allow users to access software and store data, such as Google Docs, are good examples of _________. -systems integration -cloud computing -data mining -internetworking

cloud computing

The ability to learn new technologies and assess their impact on one's work and life is _____ -intellectual property -technological inertia -computer fluency -BYOD

computer fluency

Knowing how to use a computer to gather, store or organize information is known as ____________ . -information technology -the digital divide -technology literacy -computer literacy

computer literacy

The type of maintenance of Information Systems that is usually considered the highest priority is -corrective -adaptive -preventive -perfective

corrective

Most computer crimes/abuses are committed by __________, as reported by most organizations. -spyware -current or former employees -hackers -white hats

current or former employees

support interaction between a firm and its customers

customer relationship management system (or CRM)

15. The term _____ refers to technologies in innovative ways to support the financial sector a. E-finance b. electronic bill pay c. online brokerage d. Fintech

d. Fintech

7. Which of the following statements is true about tagging? a. It is the process of categorizing digital photos. b. It is the process of distributing digital media for playback. c. it is the process of creating avatars and syndication feeds. d. It is the process of adding metadata to digital information such as files or photos

d. It is the process of adding metadata to digital information such as files or photos

10. A primary key is a. used as a secondary method of identifying an attribute b. a combination of two or more attributes c. can be duplicated within the entity d. a unique identifier for a record

d. a unique identifier for a record

4. A wiki a. allows users to add content. b. allows users to revert edits c. allows anyone to read content. d. allows all of the above.

d. allows all of the above.

8. A business model based on the __________________ caters to niche markets a. group buying b. social commerce c. paid inclusion d. long tail

d. long tail

raw symbols such as letters or numbers that have no meaning until formatted or processes

data

A firewall is part of a computer system designed to ________. (Select all that apply.) -detect instrusions -prevent unauthorized access -filter traffic -correct network errors

detect instrusions; prevent unauthorized access; filter traffic

A company whose focus is on maximizing customer service - even if it increases transportation costs, production costs is focused on _____________.

effectiveness

The extend to which goals are accomplished well.

effectiveness

A company whose focus is on minimizing production costs ( even if it sacrifices customer service) is focused on_____________.

efficiency

The extent to which goals are completed faster, at a lower cost and with little time or effort.

efficiency

The exchange of data using telecommunications networks is referred to as: -internet transmission -electronic data interchange or EDI -extended markup language -portals

electronic data interchange or EDI

____ is the process of encoding messages before the enter a network, then decoding them at the receiving end so the recipients can read (or hear) them. -encryption -authentication -doxing -tunneling

encryption

_____ is the process of encoding messages before they are transmitted through a network, then decoding them upon arrival at the destination. -encryption -authentication -biometrics -password protection

encryption

Which type of software licensing is commonly a negotiated agreement which results in a license allowing a specific number of users or installations? -enterprise license -click wrap license -shrink wrap license -business license

enterprise license

Types of business arguments discussed in the text include which of following? -faith based -fear based -financial based -fact based

faith based; fear based; fact based

Which of the following are primary components of an ERP? Select all that apply. -financial management -human resource management -value chain management -operations management

financial management; human resource management; operations management

The term given to a company that is first to enter a market thus creating a competitive advantage is ________. -competitive mover -strategic mover -first-mover -adaptor

first-mover

Giving away limited versions of a product in order to build a large customer base is called a -affiliate product -innovation -sharing economy -freemium

freemium

Information systems use information technology to collect, create, and distribute useful data. Information technology consists of -big data -hardware -software -people -telecommunications

hardware; software; telecommunications

Which of the following backup strategies includes a fully equipped location with hardware, software, and current data? -cold backup site -hot backup site -disaster recovery plan -RAID

hot backup site

___________ safeguards help protect information systems with laws, effective management and ethics. -educational -human -technological

human

formatted or organized in a manner that can be recongnized by a user or computer

information

An information system that supports functional areas, business processes and decision making within the organization is which of the following: -externally focused system -legacy system -internally focused system

internally focused system

A network of physical objects that can automatically share data over the internet is a/the __________. -smart home technologies -network effect -internet of things

internet of things

Computer maker, Dell, realized there are problems with keeping large inventories because of the fast rate of obsolescence of electronics components. Dell now keeps only minimal inventory in its factories. The company is most likely using a ________. -Scan based trading system -customer_managed inventory system -just-in-time inventory management system -vendor-managed inventory system

just-in-time inventory management system

A metric deemed most critical to accessing progress toward a certain goal is referred to as a(an) ________. -critical factor -performance metric -key performance indicator -critical performance indicator

key performance indicator

the ability to use or understand something to make informed decisions

knowledge

Which of the following are considered intangible ? Select all that apply -total cost of ownership -loss of customers -sales gains -increased customer satisfaction

loss of customers; increased customer satisfaction

A manufacturer receives a cash deposit with an order for a custom designed work desk. It will take about 7 weeks to produce the desk. Upon completion, the desk will be sent to the buyer and the balance will be paid in full. This process is known as ________. -make-to-order -order-to-cash -procure-to-pay -make-to-stock

make-to-order

In the ________ process, goods are produced based on forecasts and are stored in a warehouse and sales orders are then fulfilled from inventory. -make-to-order -make-to-stock -procure-to-pay -order-to-cash

make-to-stock

Which of the following tasks are managed by the operating system? -calculations of Excel formulas -file compressions using a Zip application -formatting the text in Microsoft Word -managing input and output devices

managing input and output devices

Which of the following is a core business activity? -payroll record keeping -common administrative tasks -human resource actvities -operations and manufacturing

operations and manufacturing

We often use information systems for learning and improving. The ability of an organization to use past behavior and information to improve its business processes is ______________. -organizational learning -supporting strategy -automating

organizational learning

Least ______ and least privileges mean that users should only be given access to the systems, data, or resources that are needed to perform their duties, and access to other resources should be restricted. -authorization -identification -passwords -permissions

permissions

The RAID method is commonly used in -processes to backup data -creating new, outsourced, information systems -processing data -naming files

processes to backup data

An alternative measure of outcome used when it is difficult to measure direct effects is a -intangible variable -proxy variable -indeterminate variable -decision variable

proxy variable

A product that uses markedly new or different technology to provide significantly greater customer benefits and eventually replaces existing products is a -radical innovation -breakthrough -open innovation -startup

radical innovation

A ___ is a document that an organization uses to tell vendors the requirements of a needed project and invite them to submit a proposal identifying how they would meet the requirements. -job announcement -vendor request -requirements specification -request for proposal

request for proposal

Organizations deploying innovative information systems must have the human capital and financial capital necessary to deploy the new systems. These requirements can be categorized as ________ requirements. -risk tolerance -process -quality -resource

resource

An organization hires an outside company to manage routine backups of the corporate data and to perform regular updates to its software. This is an example of -risk reduction -risk transference -risk rescheduling -risk acceptance

risk transference

software that gathers private information from a computer

spyware

With respect to decision making in organizations, ________ decisions are those in which the procedures to follow for a given situation can be specified in advance. -comparative -asymmetrical -structured -unstructured

structured

users pay a recurring fee, often monthly, for the use of a product or software.

subscription

Which of the following careers typically observes and/or studies the current processes/tasks that may be incorporated into a future (new) I.S. ? -systems analyst -systems developer -computer programmer

systems analyst

Which of the following careers would usually create most of the diagrams, flowcharts, entity relationship models, etc. for a new I.S. ? -systems analyst -systems developer -computer programmer

systems developer

What is meant by BYOD? -the increased focus of hardware companies on the mass market -the phenomenon that devices are becoming increasingly useful -the use of personal devices and applications for work related purposes

the use of personal devices and applications for work related purposes.

Which of the following are common reasons documentation must be kept during all phases of the SDLC? Select all that apply. -to detail installation procedures and troubleshooting suggestions -to provide an attractive, printed book about the system -to aid in the creation of training materials -as reference for users or developers

to detail installation procedures and troubleshooting suggestions; to aid in the creation of training materials; as reference for users or developers

a customer buying a product from a web site

traditional sales

Which of the following are keys to successful implementation of an Enterprise System. Select all that apply. -train users -upgrade the enterprise system regularly -evolve the implementation -Secure executive sponsorship -Get help from outside experts -secure buy-in from staff that will use the system -use a multidisciplinary approach

train users; evolve the implementation; Secure executive sponsorship; Get help from outside experts; use a multidisciplinary approach

process day-to-day, operational data

transaction processing system

a computer program that appears to be a legitimate program but carries with it a destructive computer virus

trojan horse

Which of the following terms are often used to describe Big Data? Select all that apply. -variety -virtual -volatile -volume -velocity

variety; volume; velocity

A market comprised of firms within a specific industry sector is a _____________. (An example may be an automobile manufacturer and and tire manufacturers.) -vertical market -horizontal market -supply network -vendor managed inventory

vertical market

An automobile manufacturer buying a company which produces tires is an example of expanding into the -vertical market -horizontal market -competing industry -supply chain management

vertical market

Most companies allow their employees to use ________ networks to connect to the company's intranet while on the road or working from home. -near-me area -wired -virtual private -bluetooth

virtual private

software written specifically to disrupt the normal functioning of a computer or network

virus

a computer virus that is designed to copy itself and send itself through networked computers

worm


Related study sets

Orientalism (Edward Said) Lecture

View Set

Surgery 1001-1200 ចម្លើយពេញ

View Set

단어 형태 변형 규칙 Part 3: 동사형, 부사형 파생 접미사

View Set

10.16.3 Documentation, Plagiarism, and MLA Formatting

View Set

Chapter 29 growth and development of the adolescent

View Set

Sociology 1103 Ch 14-15 Practice Quiz

View Set